US20070047543A1 - Access device for preventing transmission of copyrighted content to external network and method for the same - Google Patents
Access device for preventing transmission of copyrighted content to external network and method for the same Download PDFInfo
- Publication number
- US20070047543A1 US20070047543A1 US11/505,786 US50578606A US2007047543A1 US 20070047543 A1 US20070047543 A1 US 20070047543A1 US 50578606 A US50578606 A US 50578606A US 2007047543 A1 US2007047543 A1 US 2007047543A1
- Authority
- US
- United States
- Prior art keywords
- packet
- address
- external network
- copyrighted
- ttl
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
Definitions
- the present invention relate to an access device for preventing transmission of copyrighted contents to an external network and a method for the same, and more particularly, to an access device for preventing transmission of copyrighted contents to an external network and a method for the same, in which the copyrighted contents downloaded to a device connected to a home network are prevented from being shared with unauthorized users connected to the external network, while the downloaded contents can be freely shared between authorized users connected to the home network.
- FIG. 1 illustrates a packet transmission flow in a related art home network that employs DTCP over IP.
- the packet transmission procedure of DTCP over IP will be described with reference to FIG. 1 .
- the TTL value of the packets is set to “3” at the start of transmission.
- the TTL value of the packet is reduced to “2”.
- transmission from the access device 30 to the device 2 is allowed and the TTL value is then reduced to “1”. Therefore, transmission 10 of copyrighted content packets from the device 1 to the device 2 through the access device 30 is allowed.
- the device 1 transmits content protected packets, i.e., copyrighted content packets, to a device 50 connected to an external network
- transmission 20 from the device 1 to the access device 30 is allowed and the TTL value is then reduced to “2”.
- packet transmission 40 from the access device 30 to the device 50 connected to the external network is allowed and the TTL value is reduced to “1”. Therefore, packet transmission from the device 1 to the device 50 connected to the external network is also allowed.
- the content protected packets may be transmitted to a network connecting apartment complex or to devices outside a home network, which may be connected to the same access network as the home network.
- the copyrighted content packets in which the TTL value is set to “3” may be transmitted to devices of the external network through an access device such as a gateway that connects the home network with the external network.
- the related art methods implementing DTCP over IP have an advantage in that subscribers can freely transmit/share or play copyrighted contents within a home network. However, there is a drawback in that the contents may be transmitted to unauthorized external network.
- Exemplary embodiments of the present invention overcome the above disadvantages and other disadvantages not described above. Also, the present invention is not required to overcome the disadvantages described above, and an exemplary embodiment of the present invention may not overcome any of the problems described above.
- the present invention provides an access device for preventing transmission of copyrighted contents to an external network and a method for the same, in which copyrighted content packets is prevented from being transmitted to the external network through the access device, and thus unauthorized sharing of copyrighted contents with the external network can be prevented.
- an access device for preventing transmission of copyrighted contents to an external network.
- the access device includes a packet-header analyzer for analyzing a header of a packet received from a device of a home network, a copyrighted-content sensor for detecting whether the packet includes copyrighted content as a result of analysis by the packet header analyzer, an address converter for converting a source IP address of the packet into an IP address supported by the external network if a destination address of the packet is an address corresponding to the external network as a result of analysis by the packet header analyzer, a mapping-table generator for generating a mapping table for managing a mapping relationship between the source IP address of the packet and the converted IP address supported by the external network, and a packet transmitter for transmitting the packet to the IP address supported by the external network and discarding the packet to block transmission of the copyrighted content to the external network if the copyrighted-content sensor detects that the packet includes the copyrighted content.
- a method of preventing transmission of copyrighted content to an external network which includes receiving a packet from a device of a home network, extracting a source IP address, a destination IP address and time-to-live (TTL) information of the packet from a header of the received packet, determining whether the packet includes copyrighted content and is transmitted to the external network according to the destination IP address and the TTL information of the packet, and discarding the packet if the packet includes the copyrighted content and is transmitted to the external network.
- TTL time-to-live
- FIG. 1 is a view illustrating the transmission principle of a packet in a home network implemented with a related art DTCP over IP method
- FIG. 2 is a view illustrating the concept of a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention
- FIG. 3 is a view illustrating the overall construction of a network including an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention
- FIG. 5 is a view illustrating a network-address-translation (NAT) table managed by an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention
- FIG. 6 is a view illustrating the construction of an access device, according to an exemplary embodiment of the present invention.
- FIG. 7 is a view illustrating the structure of a packet including an IP header.
- FIG. 8 is a flowchart illustrating a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention.
- These computer program instructions may also be stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks.
- the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
- each block of the flowchart illustrations may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order. For example but not by way of limitation, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- FIG. 2 illustrates the concept of a method of preventing transmission of copyrighted contents to an external network according to an exemplary embodiment, in which the drawbacks of the related art DTCP over IP method may be overcome, an access device, such as a home gateway that connects home network with the external network, blocks transmission of copyrighted content packets to the external network if the TTL value is less than a specified value.
- an access device such as a home gateway that connects home network with the external network, blocks transmission of copyrighted content packets to the external network if the TTL value is less than a specified value.
- the related art DTCP over IP method shown in FIG. 1 enables transmission 40 of a packet to an external network device 50 because an access device 30 has a TTL value of 2 hops if a device 1 of the home network intends to transmit a copyrighted content packet to the external network device 50 .
- an access device 60 analyzes the TTL value indicated in the packet header if a packet received from the home network is one to be transmitted to the external network device 50 , and determines the packet as one that includes copyrighted content if the TTL value is less than a value, for example but not by way of limitation, 3 . Then, the access device 60 discards the packet and does not transmit the packet to the external network device 50 . Therefore, referring to FIG. 2 , since the packet received from the device 1 has a TTL value of 2, the access device 60 discards the packet and blocks transmission 70 to the external network device 50 .
- FIG. 3 illustrates the overall construction of a network including an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention.
- FIG. 3 shows an exemplary expandable home theater (XHT) network based on IEEE 1394 standard and an IP network based on the IEEE 802 standard.
- an access device 120 such as a gateway having an IP bridge function provides interactive transmission between the two networks.
- An IEEE 1394 node 110 of the XHT network can transmit an IP packet through an IP over IEEE 1394 that supports IP.
- a middleware 121 that supports IEEE 1394 of the access device 120 executes data communication with the node 110 of the XHT network.
- the access device 120 can execute data communication with an Ethernet node 130 of the external network through an Ethernet support middleware 122 .
- HNCP home network control protocol
- DHCP dynamic host configuration protocol
- a device of a general internet network, such as the Ethernet node 130 can acquire an IP address through DHCP or auto IP.
- FIG. 4 illustrates an operation principle of an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention.
- An access device 220 that links the home network with the external network serves to convert the IP address on the home network to a public IP address that can be identified on the external network. That is, the access device 220 has a network address translation (NAT) function.
- NAT network address translation
- IPv4 addresses assigned to the home network in accordance with Internet Engineering Task Force Request for Comments (IETF RFC) 1918 correspond to addresses in 10.1.1.1 ⁇ 10.127.254.254. Although these addresses are recognized as identifiers that identifies devices within the home network, communication is made essentially through a public IPv4 address when communicating with the external network.
- the access device 220 executes NAT that converts a private Ipv4 address of the home network to a public IPv4 address.
- the access device 220 executes address mapping using its public IP address and a port number. Therefore, the device of the external network can identify the device of the home network using an address obtained by a combination of the public IP address of the access device and the port number.
- the access device 220 can determine whether the devices on the home network transmit data to the external network.
- Such address mapping can be executed because both the IEEE 1394 network and the internet network, which may be arranged at both sides based on the access device 220 , use Internet Protocol.
- the access device 220 identifies a private IP address of each device on the home network using a port number of TCP/IP protocol. At this time, the access device 220 has a table that matches each in/out private IP with the port number.
- the device 211 having a private IP address corresponding to 10.2.2.1 is assigned with a port number, 1024 .
- the access device 220 has the same port number 1024 and the same address, 10.2.2.1.
- the access device 220 transmits a packet received from the device 211 to the external network through its public IP address, 171.69.20.1 and the port number 1024 .
- the access device 220 adds to the NAT table 221 address mapping information corresponding to session between the device 211 and the device 231 .
- the device 231 having the public IP address, 171.69.2.1 cannot identify which device on the home network has transmitted the packet, but can recognize the packet as one transmitted from a home gateway having a public IP. Therefore, the device 231 transmits the packet to the access device 220 using the port number 1024 .
- the access device 220 that has received the packet identifies the port number and searches for address mapping information (first row in table of FIG. 5 ) having the same port number from the mapping table 221 .
- the access device 220 transmits the packet to 10.2.2.1 mapped on the port number 1024 .
- FIG. 5 illustrates a network address translation (NAT) table managed by an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention.
- NAT network address translation
- the first row of the NAT table represents address mapping information corresponding to session between the device 211 on the home network and the device 231 on the external network
- the second row of the NAT table represents address mapping information corresponding to session between the device 212 on the home network and the device 232 on the external network.
- the NAT table may dynamically be generated and updated as described above with reference to FIG. 4 .
- the NAT table may statically be generated.
- FIG. 6 is a block diagram illustrating an access device according to an exemplary embodiment of the present invention.
- An access device 300 includes a packet analyzer 310 , an address converter 320 , a copyrighted-content sensor 340 , a mapping-table generator 350 , and a packet transmitter 330 .
- the packet analyzer 310 receives a packet having a private IP address as a source IP address from a device on a home network and analyzes the packet header. If the packet is one transmitted to a device on an external network, the source address of the packet represents a private IP address of the device on the home network and a destination address represents a public IP address of the device on the external network. A structure of the packet will be described with reference to FIG. 7 .
- the packet analyzer 310 parses the packet to acquire a time-to-live (TTL) field of the packet, the source IP address, and the destination IP address from the packet header.
- TTL time-to-live
- the copyrighted-content sensor 340 detects that the packet includes copyrighted content if the TTL field value of the packet from the packet analyzer 310 is less than a specified value. For example, if the TTL field value of the packet is less than or equal to three hops under the related DTCP over IP protocol standard, the packet is regarded as one that includes copyrighted content and thus should be prevented from being transmitted to the external network. However, since a reference value of the TTL field that determines whether the packet includes copyrighted content may be varied, the exemplary embodiment can be applied to the reference value of every TTL field.
- the copyrighted-content sensor 340 After detecting that the received packet includes copyrighted content, the copyrighted-content sensor 340 provides the copyrighted-content detection information to the address converter 320 , the mapping-table generator 350 or the packet transmitter 330 , so as to block transmission of the packet to the external network. More specifically, if the input packet corresponds to a copyrighted content packet, the copyrighted-content sensor 340 controls the address converter 320 to not execute the address conversion or terminate the address conversion if address conversion has been executed by the address converter 320 , and the copyrighted-content sensor 340 controls the mapping-table generator 350 to discard mapping information so as to not update the mapping table with mapping information. If the mapping table is not dynamically but statically made, the copyrighted-content sensor 340 controls the packet transmitter 330 to discard the packet so as to prevent transmission of the packet to the external network.
- the address converter 320 receives the source IP address and the destination IP address from the packet analyzer 310 and converts the private IP address of the source to the public IP address if the destination address corresponds to an address of the device on the external network.
- the method of converting the private IP address to the public IP address is as follows.
- the access device 300 identifies the private IP address of each device on the home network through the port number of TCP/IP protocol.
- the private IP address of each device is converted to a public IP address by using a combination of the port number and the public IP address of the access device 300 , and the device on the external network can communicate with the device on the home network using the converted public IP address.
- the address converter 320 transmits information on session between the source device and the destination device, i.e., mapping information on the private IP address and the public IP address of the source device on the home network and the IP address of the destination device, to the mapping-table generator 350 .
- the address converter 320 may not execute mapping of the source address.
- the mapping-table generator 350 updates information corresponding to session transmitted from the address converter 320 , i.e., a mapping-information list of the private IP address and the public IP address of the source device and the IP address of the destination device, to the mapping table.
- An outline of the mapping table is as shown in FIG. 5 , as disclosed above.
- the mapping-table generator 350 does update the mapping table with a list corresponding to mapping information of the corresponding session.
- the packet transmitter 330 discards the packet to block transmission of the packet to the external network. If the input packet does not include copyrighted content, the packet transmitter 330 transmits the packet to the external network device corresponding to the destination IP address.
- each component as illustrated in FIG. 6 may include, but is not limited to, a software or hardware component, such as a field programmable gate-array (FPGA) or application-specific integrated circuit (ASIC), which performs certain tasks.
- a module may be configured to reside on the addressable storage medium and configured to execute on one or more processors. The functionality provided in the components and modules may be combined into fewer components and modules or further separated into additional components and modules.
- FIG. 7 illustrates the structure of a packet 400 including an IP header.
- a header of the packet includes a field having version information, a field having a value indicating the length of the header, a field representing service types, a field having a value indicating the whole length of the packet, an IP identification field, a flag field, and a fragment offset field.
- a TTL field 410 represents TTL of the packet within a network as the number of hops
- a source IP address field 420 indicates a private IP address of the device on the home network
- a destination IP address 430 indicates a public IP address of the device on the external network.
- FIG. 8 is a flowchart illustrating a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention.
- the access device 300 receives the packet from the device on the home network that employs the DTCP over IP method (operation S 510 ), and extracts the source IP address 420 , the destination IP address 430 , and the TTL information 410 of the packet from the packet header (operation S 520 ).
- the access device 300 determines whether the packet is to be transmitted to the external network, in accordance with the destination IP address 430 (operation S 530 ). If the destination IP address 430 corresponds to the IP address of the device on the external network (YES in operation S 530 ), the access device 300 determines whether the packet includes copyrighted content (operation S 540 ).
- the access device 300 determines the packet as one that includes copyrighted content (operation S 540 ) and blocks transmission of the packet to the external network.
- the method of blocking transmission of packets to the external network includes discarding the packet as shown in FIG. 6 (operation S 550 ), and skipping conversion of the private IP address of the source device corresponding to current session to the public IP address (operation S 560 ).
- the operation of skipping conversion of the private IP address of the source device corresponding to current session to the public IP address S 560 can be achieved by controlling the address converter 320 of the access device 300 to not convert the private IP address of the source device to the public IP address or terminate the address conversion if address conversion has been executed, or controlling the mapping-table generator 350 to not update the mapping table with the mapping information on the destination IP address, the public IP address and the private IP address of the source device corresponding to current session.
- mapping table is statically generated, the corresponding packet is discarded to block transmission of the packet to the external network.
- the access device 300 transmits the packet to the destination device within the home network through internal bridging (operation S 570 ).
- the access device 300 determines the packet as one that does not include copyrighted content, and updates the NAT table with the mapping information on the private IP address and the public IP address of the source device corresponding to current session and the IP address of the destination device (operation S 580 ). The access device 300 transmits the packet to the device on the external network (operation S 590 ).
- the access device for preventing transmission of copyrighted contents to an external network As described above, in the access device for preventing transmission of copyrighted contents to an external network and the method for the same, transmission of copyrighted-content packets to the external network is blocked by the access device that links the home network with the external network, so as to prevent copyrighted contents from being shared with the unauthorized external network.
Abstract
Description
- This application claims priority from Korean Patent Application No. 10-2005-0077894 filed on Aug. 24, 2005 in the Korean Intellectual Property Office, the disclosures of which are incorporated herein by reference in their entirety.
- 1. Field of the Invention
- The present invention relate to an access device for preventing transmission of copyrighted contents to an external network and a method for the same, and more particularly, to an access device for preventing transmission of copyrighted contents to an external network and a method for the same, in which the copyrighted contents downloaded to a device connected to a home network are prevented from being shared with unauthorized users connected to the external network, while the downloaded contents can be freely shared between authorized users connected to the home network.
- 2. Description of the Related Art
- In the related art, web content providers provide copyrighted contents based on paid subscription and limits (or prevents) the contents from being shared with unauthorized users. To protect various audiovisual (AV) contents such as internet broadcasts, images, and MP3 music files, transmission of contents to unauthorized users is blocked by using various related art methods such as a conditional access system (CAS). In such a method for protecting copyrighted contents, contents can only be played in a specified device, transmission of contents is prohibited even within a home network, or contents are often prohibited from being stored on a device. In such cases, there is a considerable limitation in sharing or playing the web contents on a private home network. This adversely affects AV home-network business from the standpoint of both the consumers and service providers. To overcome such a limitation, a digital transmission content protection over Internet Protocol (DTCP over IP) method has been suggested.
-
FIG. 1 illustrates a packet transmission flow in a related art home network that employs DTCP over IP. - DTCP over IP is one of methods that enable transmission and play of copyrighted contents in a certain areas such as a home network. More specifically, DTCP over IP restricts transmission of packets having a header indicated with a time-to-live (TTL) value of “3”, or restricts a round-trip time (RTT) of packets to 7 ms, so the area to which packets can be transmitted is restricted to a home network.
- The packet transmission procedure of DTCP over IP will be described with reference to
FIG. 1 . When adevice 1 transmits packets of copyrighted content to adevice 2 through anaccess device 30, the TTL value of the packets is set to “3” at the start of transmission. Then, when the packets are transmitted from thedevice 1 to theaccess device 30, the TTL value of the packet is reduced to “2”. Here, since the TTL value is greater than “0”, transmission from theaccess device 30 to thedevice 2 is allowed and the TTL value is then reduced to “1”. Therefore,transmission 10 of copyrighted content packets from thedevice 1 to thedevice 2 through theaccess device 30 is allowed. - Similarly, in the case of an external network, when the
device 1 transmits content protected packets, i.e., copyrighted content packets, to adevice 50 connected to an external network,transmission 20 from thedevice 1 to theaccess device 30 is allowed and the TTL value is then reduced to “2”. Again, since the TTL value is greater than “0”,packet transmission 40 from theaccess device 30 to thedevice 50 connected to the external network is allowed and the TTL value is reduced to “1”. Therefore, packet transmission from thedevice 1 to thedevice 50 connected to the external network is also allowed. - As described above, when the related art DTCP over IP method is used, there is at least one problem in that the content protected packets may be transmitted to a network connecting apartment complex or to devices outside a home network, which may be connected to the same access network as the home network.
- When implementing the DTCP over IP method, transmission of copyrighted content packets to external network still cannot be prevented under the related art standard in which the TTL value of the content protected packet is set to “3”, and as a result, the policy that permits the copyrighted contents to be shared only within the authorized home network is often violated. More specifically, the copyrighted content packets in which the TTL value is set to “3” may be transmitted to devices of the external network through an access device such as a gateway that connects the home network with the external network.
- The related art methods implementing DTCP over IP have an advantage in that subscribers can freely transmit/share or play copyrighted contents within a home network. However, there is a drawback in that the contents may be transmitted to unauthorized external network.
- Exemplary embodiments of the present invention overcome the above disadvantages and other disadvantages not described above. Also, the present invention is not required to overcome the disadvantages described above, and an exemplary embodiment of the present invention may not overcome any of the problems described above.
- The present invention provides an access device for preventing transmission of copyrighted contents to an external network and a method for the same, in which copyrighted content packets is prevented from being transmitted to the external network through the access device, and thus unauthorized sharing of copyrighted contents with the external network can be prevented.
- According to an aspect of the present invention, there is provided an access device for preventing transmission of copyrighted contents to an external network. The access device includes a packet-header analyzer for analyzing a header of a packet received from a device of a home network, a copyrighted-content sensor for detecting whether the packet includes copyrighted content as a result of analysis by the packet header analyzer, an address converter for converting a source IP address of the packet into an IP address supported by the external network if a destination address of the packet is an address corresponding to the external network as a result of analysis by the packet header analyzer, a mapping-table generator for generating a mapping table for managing a mapping relationship between the source IP address of the packet and the converted IP address supported by the external network, and a packet transmitter for transmitting the packet to the IP address supported by the external network and discarding the packet to block transmission of the copyrighted content to the external network if the copyrighted-content sensor detects that the packet includes the copyrighted content.
- According to another aspect of the present invention, there is provided a method of preventing transmission of copyrighted content to an external network, which includes receiving a packet from a device of a home network, extracting a source IP address, a destination IP address and time-to-live (TTL) information of the packet from a header of the received packet, determining whether the packet includes copyrighted content and is transmitted to the external network according to the destination IP address and the TTL information of the packet, and discarding the packet if the packet includes the copyrighted content and is transmitted to the external network.
- The above and other aspects of the present invention will be more apparent from the following detailed description of exemplary embodiments taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a view illustrating the transmission principle of a packet in a home network implemented with a related art DTCP over IP method; -
FIG. 2 is a view illustrating the concept of a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention; -
FIG. 3 is a view illustrating the overall construction of a network including an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention; -
FIG. 4 is a view illustrating the operation principle of an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention; -
FIG. 5 is a view illustrating a network-address-translation (NAT) table managed by an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention; -
FIG. 6 is a view illustrating the construction of an access device, according to an exemplary embodiment of the present invention; -
FIG. 7 is a view illustrating the structure of a packet including an IP header; and -
FIG. 8 is a flowchart illustrating a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention. - Hereinafter, exemplary embodiments will be described in detail with reference to the accompanying drawings. The aspects and features and methods for achieving the aspects and features will be apparent by referring to the exemplary embodiments to be described in detail with reference to the accompanying drawings. However, the present invention is not limited to the exemplary embodiments disclosed hereinafter, but can be implemented in various forms. The matters defined in the description, such as the detailed construction and elements, are provided to assist those of ordinary skill in the art in a comprehensive understanding of the invention. In the whole description of the exemplary embodiments, the same reference numerals are used for the same or similar elements across various figures.
- Hereinafter, exemplary embodiments of the present invention will be described with reference to the accompanying drawings illustrating block diagrams and flowcharts. It will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which are executed via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks.
- These computer program instructions may also be stored in a computer usable or computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
- Further, each block of the flowchart illustrations may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order. For example but not by way of limitation, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
-
FIG. 2 illustrates the concept of a method of preventing transmission of copyrighted contents to an external network according to an exemplary embodiment, in which the drawbacks of the related art DTCP over IP method may be overcome, an access device, such as a home gateway that connects home network with the external network, blocks transmission of copyrighted content packets to the external network if the TTL value is less than a specified value. - The related art DTCP over IP method shown in
FIG. 1 enablestransmission 40 of a packet to anexternal network device 50 because anaccess device 30 has a TTL value of 2 hops if adevice 1 of the home network intends to transmit a copyrighted content packet to theexternal network device 50. However, anaccess device 60 according to an exemplary embodiment analyzes the TTL value indicated in the packet header if a packet received from the home network is one to be transmitted to theexternal network device 50, and determines the packet as one that includes copyrighted content if the TTL value is less than a value, for example but not by way of limitation, 3. Then, theaccess device 60 discards the packet and does not transmit the packet to theexternal network device 50. Therefore, referring toFIG. 2 , since the packet received from thedevice 1 has a TTL value of 2, theaccess device 60 discards the packet and blockstransmission 70 to theexternal network device 50. -
FIG. 3 illustrates the overall construction of a network including an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention. -
FIG. 3 shows an exemplary expandable home theater (XHT) network based onIEEE 1394 standard and an IP network based on the IEEE 802 standard. For linking the two networks, anaccess device 120 such as a gateway having an IP bridge function provides interactive transmission between the two networks. - An
IEEE 1394node 110 of the XHT network can transmit an IP packet through an IP overIEEE 1394 that supports IP. Amiddleware 121 that supportsIEEE 1394 of theaccess device 120 executes data communication with thenode 110 of the XHT network. Theaccess device 120 can execute data communication with anEthernet node 130 of the external network through anEthernet support middleware 122. To this end, home network control protocol (HNCP) or dynamic host configuration protocol (DHCP) overIEEE 1394 is used so that thenode 110 of the XHT network can acquire an IP address. A device of a general internet network, such as theEthernet node 130, can acquire an IP address through DHCP or auto IP. -
FIG. 4 illustrates an operation principle of an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention. - An
access device 220 that links the home network with the external network serves to convert the IP address on the home network to a public IP address that can be identified on the external network. That is, theaccess device 220 has a network address translation (NAT) function. - IPv4 addresses assigned to the home network in accordance with Internet Engineering Task Force Request for Comments (IETF RFC) 1918 correspond to addresses in 10.1.1.1˜10.127.254.254. Although these addresses are recognized as identifiers that identifies devices within the home network, communication is made essentially through a public IPv4 address when communicating with the external network. To execute communication between a device on the home network and a device on the external network, the
access device 220 executes NAT that converts a private Ipv4 address of the home network to a public IPv4 address. At this time, theaccess device 220 executes address mapping using its public IP address and a port number. Therefore, the device of the external network can identify the device of the home network using an address obtained by a combination of the public IP address of the access device and the port number. - To allow all the devices existing on the home network to communicate with the external network, the above-disclosed address mapping is required. Therefore, the
access device 220 can determine whether the devices on the home network transmit data to the external network. Such address mapping can be executed because both theIEEE 1394 network and the internet network, which may be arranged at both sides based on theaccess device 220, use Internet Protocol. Theaccess device 220 identifies a private IP address of each device on the home network using a port number of TCP/IP protocol. At this time, theaccess device 220 has a table that matches each in/out private IP with the port number. - For example but not by way of limitation, referring to
FIG. 4 , for data communication between adevice 211 and adevice 231 on the external network, thedevice 211 having a private IP address corresponding to 10.2.2.1 is assigned with a port number, 1024. Here, theaccess device 220 has the same port number 1024 and the same address, 10.2.2.1. Theaccess device 220 transmits a packet received from thedevice 211 to the external network through its public IP address, 171.69.20.1 and the port number 1024. At this time, theaccess device 220 adds to the NAT table 221 address mapping information corresponding to session between thedevice 211 and thedevice 231. - The
device 231 having the public IP address, 171.69.2.1 cannot identify which device on the home network has transmitted the packet, but can recognize the packet as one transmitted from a home gateway having a public IP. Therefore, thedevice 231 transmits the packet to theaccess device 220 using the port number 1024. Theaccess device 220 that has received the packet identifies the port number and searches for address mapping information (first row in table ofFIG. 5 ) having the same port number from the mapping table 221. Theaccess device 220 transmits the packet to 10.2.2.1 mapped on the port number 1024. -
FIG. 5 illustrates a network address translation (NAT) table managed by an access device for preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention. - The first row of the NAT table represents address mapping information corresponding to session between the
device 211 on the home network and thedevice 231 on the external network, while the second row of the NAT table represents address mapping information corresponding to session between thedevice 212 on the home network and thedevice 232 on the external network. - The NAT table may dynamically be generated and updated as described above with reference to
FIG. 4 . Alternatively, the NAT table may statically be generated. -
FIG. 6 is a block diagram illustrating an access device according to an exemplary embodiment of the present invention. Anaccess device 300 includes apacket analyzer 310, anaddress converter 320, a copyrighted-content sensor 340, a mapping-table generator 350, and apacket transmitter 330. - The
packet analyzer 310 receives a packet having a private IP address as a source IP address from a device on a home network and analyzes the packet header. If the packet is one transmitted to a device on an external network, the source address of the packet represents a private IP address of the device on the home network and a destination address represents a public IP address of the device on the external network. A structure of the packet will be described with reference toFIG. 7 . Thepacket analyzer 310 parses the packet to acquire a time-to-live (TTL) field of the packet, the source IP address, and the destination IP address from the packet header. - The copyrighted-
content sensor 340 detects that the packet includes copyrighted content if the TTL field value of the packet from thepacket analyzer 310 is less than a specified value. For example, if the TTL field value of the packet is less than or equal to three hops under the related DTCP over IP protocol standard, the packet is regarded as one that includes copyrighted content and thus should be prevented from being transmitted to the external network. However, since a reference value of the TTL field that determines whether the packet includes copyrighted content may be varied, the exemplary embodiment can be applied to the reference value of every TTL field. - After detecting that the received packet includes copyrighted content, the copyrighted-
content sensor 340 provides the copyrighted-content detection information to theaddress converter 320, the mapping-table generator 350 or thepacket transmitter 330, so as to block transmission of the packet to the external network. More specifically, if the input packet corresponds to a copyrighted content packet, the copyrighted-content sensor 340 controls theaddress converter 320 to not execute the address conversion or terminate the address conversion if address conversion has been executed by theaddress converter 320, and the copyrighted-content sensor 340 controls the mapping-table generator 350 to discard mapping information so as to not update the mapping table with mapping information. If the mapping table is not dynamically but statically made, the copyrighted-content sensor 340 controls thepacket transmitter 330 to discard the packet so as to prevent transmission of the packet to the external network. - The
address converter 320 receives the source IP address and the destination IP address from thepacket analyzer 310 and converts the private IP address of the source to the public IP address if the destination address corresponds to an address of the device on the external network. The method of converting the private IP address to the public IP address is as follows. - The
access device 300 identifies the private IP address of each device on the home network through the port number of TCP/IP protocol. The private IP address of each device is converted to a public IP address by using a combination of the port number and the public IP address of theaccess device 300, and the device on the external network can communicate with the device on the home network using the converted public IP address. Theaddress converter 320 transmits information on session between the source device and the destination device, i.e., mapping information on the private IP address and the public IP address of the source device on the home network and the IP address of the destination device, to the mapping-table generator 350. - On the other hand, if the copyrighted-
content sensor 340 provides the copyrighted-content detection information to theaddress converter 320 that the packet to be transmitted to the external network includes copyrighted content, theaddress converter 320 may not execute mapping of the source address. - The mapping-
table generator 350 updates information corresponding to session transmitted from theaddress converter 320, i.e., a mapping-information list of the private IP address and the public IP address of the source device and the IP address of the destination device, to the mapping table. An outline of the mapping table is as shown inFIG. 5 , as disclosed above. Alternatively, if the copyrighted-content sensor 340 provides the copyrighted-content detection information to the mapping-table generator 350 that the packet to be transmitted to the external network includes copyrighted content, the mapping-table generator 350 does update the mapping table with a list corresponding to mapping information of the corresponding session. - If the input packet includes copyrighted content, the
packet transmitter 330 discards the packet to block transmission of the packet to the external network. If the input packet does not include copyrighted content, thepacket transmitter 330 transmits the packet to the external network device corresponding to the destination IP address. - In the exemplary embodiment, each component as illustrated in
FIG. 6 may include, but is not limited to, a software or hardware component, such as a field programmable gate-array (FPGA) or application-specific integrated circuit (ASIC), which performs certain tasks. A module may be configured to reside on the addressable storage medium and configured to execute on one or more processors. The functionality provided in the components and modules may be combined into fewer components and modules or further separated into additional components and modules. -
FIG. 7 illustrates the structure of apacket 400 including an IP header. A header of the packet includes a field having version information, a field having a value indicating the length of the header, a field representing service types, a field having a value indicating the whole length of the packet, an IP identification field, a flag field, and a fragment offset field. - If the packet is transmitted from the device on the home network to the device on the external network, a
TTL field 410 represents TTL of the packet within a network as the number of hops, a sourceIP address field 420 indicates a private IP address of the device on the home network, and adestination IP address 430 indicates a public IP address of the device on the external network. -
FIG. 8 is a flowchart illustrating a method of preventing transmission of copyrighted contents to an external network, according to an exemplary embodiment of the present invention. - The
access device 300 according to an exemplary embodiment receives the packet from the device on the home network that employs the DTCP over IP method (operation S510), and extracts thesource IP address 420, thedestination IP address 430, and theTTL information 410 of the packet from the packet header (operation S520). - The
access device 300 determines whether the packet is to be transmitted to the external network, in accordance with the destination IP address 430 (operation S530). If thedestination IP address 430 corresponds to the IP address of the device on the external network (YES in operation S530), theaccess device 300 determines whether the packet includes copyrighted content (operation S540). - In the exemplary embodiment shown in
FIG. 8 , if theTTL field value 410 of the packet is less than or equal to three hops, theaccess device 300 determines the packet as one that includes copyrighted content (operation S540) and blocks transmission of the packet to the external network. The method of blocking transmission of packets to the external network includes discarding the packet as shown inFIG. 6 (operation S550), and skipping conversion of the private IP address of the source device corresponding to current session to the public IP address (operation S560). - The operation of skipping conversion of the private IP address of the source device corresponding to current session to the public IP address S560 can be achieved by controlling the
address converter 320 of theaccess device 300 to not convert the private IP address of the source device to the public IP address or terminate the address conversion if address conversion has been executed, or controlling the mapping-table generator 350 to not update the mapping table with the mapping information on the destination IP address, the public IP address and the private IP address of the source device corresponding to current session. - Furthermore, if the mapping table is statically generated, the corresponding packet is discarded to block transmission of the packet to the external network.
- Alternatively, if the packet is not transmitted to the external network (NO in operation S530), the
access device 300 transmits the packet to the destination device within the home network through internal bridging (operation S570). - Furthermore, if the packet is transmitted to the external network (YES in operation S530) and the TTL value is greater than a specified value, for example but not by way of limitation, three hops (NO in operation S540), the
access device 300 determines the packet as one that does not include copyrighted content, and updates the NAT table with the mapping information on the private IP address and the public IP address of the source device corresponding to current session and the IP address of the destination device (operation S580). Theaccess device 300 transmits the packet to the device on the external network (operation S590). - As described above, in the access device for preventing transmission of copyrighted contents to an external network and the method for the same, transmission of copyrighted-content packets to the external network is blocked by the access device that links the home network with the external network, so as to prevent copyrighted contents from being shared with the unauthorized external network.
- Although exemplary embodiments have been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
Claims (20)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2005-0077894 | 2005-08-24 | ||
KR20050077894A KR100654463B1 (en) | 2005-08-24 | 2005-08-24 | Access device preventing transmission of copyrighted content to external network and method for the same |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070047543A1 true US20070047543A1 (en) | 2007-03-01 |
US8582574B2 US8582574B2 (en) | 2013-11-12 |
Family
ID=37440843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/505,786 Expired - Fee Related US8582574B2 (en) | 2005-08-24 | 2006-08-18 | Access device for preventing transmission of copyrighted content to external network and method for the same |
Country Status (6)
Country | Link |
---|---|
US (1) | US8582574B2 (en) |
EP (1) | EP1758340B1 (en) |
JP (1) | JP2007060657A (en) |
KR (1) | KR100654463B1 (en) |
CN (1) | CN1921452B (en) |
DE (1) | DE602006017308D1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040103303A1 (en) * | 2002-08-28 | 2004-05-27 | Hiroki Yamauchi | Content-duplication management system, apparatus and method, playback apparatus and method, and computer program |
US20150163206A1 (en) * | 2013-12-11 | 2015-06-11 | Intralinks, Inc. | Customizable secure data exchange environment |
US20230209350A1 (en) * | 2019-04-29 | 2023-06-29 | Sonicwall Inc. | Method for providing an elastic content filtering security service in a mesh network |
US11800598B2 (en) | 2019-04-29 | 2023-10-24 | Sonicwall Inc. | Method for providing an elastic content filtering security service in a mesh network |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104202743B (en) | 2008-04-29 | 2017-11-07 | 苹果公司 | The ubiquitous access of the network of base station from home connection |
JP5189512B2 (en) * | 2009-01-27 | 2013-04-24 | 株式会社日立製作所 | Packet transfer method and node device |
KR101508673B1 (en) * | 2009-07-23 | 2015-04-08 | 에스케이텔레콤 주식회사 | System and method for network linking |
CN101888418B (en) * | 2010-07-12 | 2012-11-07 | 中国电信股份有限公司 | Method and system for solving IPv4 address shortage in dual-stack network |
JP6221429B2 (en) * | 2013-07-08 | 2017-11-01 | ソニー株式会社 | Content transmission system |
JP6221428B2 (en) * | 2013-07-08 | 2017-11-01 | ソニー株式会社 | Content receiving apparatus, content receiving method, and computer program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040136356A1 (en) * | 2003-01-14 | 2004-07-15 | Shih-Min Kuo | Router and method for transmitting packets |
US20040151179A1 (en) * | 2003-01-31 | 2004-08-05 | Andre Michael R.. | Methods and apparatus to limit transmission of data to a localized area |
US20070009232A1 (en) * | 2003-08-26 | 2007-01-11 | Kenji Muraki | Information processing system, information processing method, computer program executed in information processing system |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0998185A (en) | 1995-10-02 | 1997-04-08 | Hitachi Cable Ltd | Avoiding method for loop of data in network |
JP2001230806A (en) | 2000-02-16 | 2001-08-24 | Hitachi Cable Ltd | Address converter |
KR20020034280A (en) | 2000-10-31 | 2002-05-09 | 정규석 | A NAT Table Structure for effective searching and management of NAT Table in PC |
KR20020023100A (en) | 2001-05-28 | 2002-03-28 | 박현제 | System for virtual multicast network depolyment |
KR100443412B1 (en) | 2002-06-14 | 2004-08-09 | 이임영 | An illegal digital contents copy protection method using hidden agent |
TWI304970B (en) | 2002-08-28 | 2009-01-01 | Matsushita Electric Ind Co Ltd | Networked apparatus, content duplication management system and method, and computer-readable medium having recorded therein content duplication management program |
JP3826100B2 (en) | 2002-11-27 | 2006-09-27 | 株式会社東芝 | Communication relay device, communication system and communication control program |
KR20030018018A (en) | 2003-01-03 | 2003-03-04 | 박헌재 | Packet Control System and Method |
JP4214807B2 (en) | 2003-03-26 | 2009-01-28 | パナソニック株式会社 | Copyright protection system, transmission apparatus, copyright protection method, and recording medium |
GB2403355A (en) | 2003-06-24 | 2004-12-29 | Bombardier Transp | Current converter with variable switching repitition frequency |
-
2005
- 2005-08-24 KR KR20050077894A patent/KR100654463B1/en active IP Right Grant
-
2006
- 2006-08-11 JP JP2006220091A patent/JP2007060657A/en active Pending
- 2006-08-18 EP EP20060119198 patent/EP1758340B1/en not_active Expired - Fee Related
- 2006-08-18 DE DE200660017308 patent/DE602006017308D1/en active Active
- 2006-08-18 US US11/505,786 patent/US8582574B2/en not_active Expired - Fee Related
- 2006-08-22 CN CN2006101159843A patent/CN1921452B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040136356A1 (en) * | 2003-01-14 | 2004-07-15 | Shih-Min Kuo | Router and method for transmitting packets |
US20040151179A1 (en) * | 2003-01-31 | 2004-08-05 | Andre Michael R.. | Methods and apparatus to limit transmission of data to a localized area |
US20070009232A1 (en) * | 2003-08-26 | 2007-01-11 | Kenji Muraki | Information processing system, information processing method, computer program executed in information processing system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040103303A1 (en) * | 2002-08-28 | 2004-05-27 | Hiroki Yamauchi | Content-duplication management system, apparatus and method, playback apparatus and method, and computer program |
US7752433B2 (en) * | 2002-08-28 | 2010-07-06 | Panasonic Corporation | Content-duplication management system, apparatus and method, playback apparatus and method, and computer program |
US20150163206A1 (en) * | 2013-12-11 | 2015-06-11 | Intralinks, Inc. | Customizable secure data exchange environment |
US20230209350A1 (en) * | 2019-04-29 | 2023-06-29 | Sonicwall Inc. | Method for providing an elastic content filtering security service in a mesh network |
US11800598B2 (en) | 2019-04-29 | 2023-10-24 | Sonicwall Inc. | Method for providing an elastic content filtering security service in a mesh network |
US11863987B2 (en) * | 2019-04-29 | 2024-01-02 | Sonicwall Inc. | Method for providing an elastic content filtering security service in a mesh network |
Also Published As
Publication number | Publication date |
---|---|
KR100654463B1 (en) | 2006-12-06 |
US8582574B2 (en) | 2013-11-12 |
JP2007060657A (en) | 2007-03-08 |
CN1921452B (en) | 2013-05-29 |
EP1758340A1 (en) | 2007-02-28 |
DE602006017308D1 (en) | 2010-11-18 |
EP1758340B1 (en) | 2010-10-06 |
CN1921452A (en) | 2007-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8582574B2 (en) | Access device for preventing transmission of copyrighted content to external network and method for the same | |
RU2735725C1 (en) | Method and device for processing and sending packets, pe node and node | |
JP5069356B2 (en) | Techniques for address resolution in data transmission networks. | |
US7855955B2 (en) | Method for managing frames in a global-area communications network, corresponding computer-readable storage medium and tunnel endpoint | |
EP1739897B1 (en) | Information processing device, and bubble packet transmission method and program | |
Bashandy et al. | Segment Routing with MPLS data plane | |
US8565237B2 (en) | Concurrent data transfer involving two or more transport layer protocols over a single one-way data link | |
JP4327142B2 (en) | Information processing system, tunnel communication device, tunnel communication method, proxy response device, and proxy response method | |
US9705844B2 (en) | Address management in a connectivity platform | |
US8737396B2 (en) | Communication method and communication system | |
JP2007036374A (en) | Packet transfer apparatus, communication network, and packet transfer method | |
McPherson et al. | Architectural considerations of IP anycast | |
US9356952B2 (en) | Packet redirection in a communication network | |
Tuexen et al. | UDP encapsulation of Stream Control Transmission Protocol (SCTP) packets for end-host to end-host communication | |
JP5242301B2 (en) | Message transfer device, output method, and output program | |
US9509659B2 (en) | Connectivity platform | |
JP2004357016A (en) | Apparatus for restricting use of specific address | |
KR101847788B1 (en) | Unidirectional transmission system | |
Filsfils et al. | SRv6 Network Programming draft-filsfils-spring-srv6-network-programming-06 | |
WO2012014930A1 (en) | Communication system, control apparatus and control program | |
WO2013035309A1 (en) | Agent device and communication relay method | |
Hughes | IPv6 Core Protocols | |
Previdi et al. | RFC 8660: Segment Routing with the MPLS Data Plane | |
McGann | IPv6 packet filtering | |
US8572283B2 (en) | Selectively applying network address port translation to data traffic through a gateway in a communications network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHIN, DONG-YUN;PARK, SUNG-JOON;HWANG, YOO-SEUNG;REEL/FRAME:018211/0517 Effective date: 20060808 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20211112 |